Chromium Code Reviews| Index: chrome/browser/ssl/ssl_error_classification.h |
| diff --git a/chrome/browser/ssl/ssl_error_classification.h b/chrome/browser/ssl/ssl_error_classification.h |
| index cb07f8f9cb342b8fdd793dfe9217d6af027d434f..f1fc6ef200483114bb5bde4d9f6b5bcac3a94d95 100644 |
| --- a/chrome/browser/ssl/ssl_error_classification.h |
| +++ b/chrome/browser/ssl/ssl_error_classification.h |
| @@ -9,17 +9,29 @@ |
| #include <vector> |
| #include "base/time/time.h" |
| +#include "content/public/browser/notification_observer.h" |
| +#include "content/public/browser/notification_registrar.h" |
| #include "net/cert/x509_certificate.h" |
| #include "url/gurl.h" |
| -// This class calculates the severity scores for the different type of SSL |
| -// errors. |
| -class SSLErrorClassification { |
| +namespace content { |
| +class WebContents; |
| +} |
| + |
| +// This class classifies characteristics of SSL errors, including information |
| +// about captive portal detection. |
| +// |
| +// This class should only be used on the UI thread because its |
| +// implementation uses captive_portal::CaptivePortalService which can only be |
| +// accessed on the UI thread. |
| +class SSLErrorClassification : public content::NotificationObserver { |
| public: |
| - SSLErrorClassification(const base::Time& current_time, |
| + SSLErrorClassification(content::WebContents* web_contents, |
| + const base::Time& current_time, |
| const GURL& url, |
| + int cert_error, |
| const net::X509Certificate& cert); |
| - ~SSLErrorClassification(); |
| + virtual ~SSLErrorClassification(); |
|
palmer
2014/08/30 00:28:19
Why virtual?
felt
2014/08/30 01:11:52
I believe this should be virtual because the Obser
|
| // Returns true if the system time is in the past. |
| static bool IsUserClockInThePast(const base::Time& time_now); |
| @@ -31,18 +43,19 @@ class SSLErrorClassification { |
| static bool IsWindowsVersionSP3OrLower(); |
| // A function which calculates the severity score when the ssl error is |
| - // CERT_DATE_INVALID, returns a score between 0.0 and 1.0, higher values |
| - // being more severe, indicating how severe the certificate's invalid |
| - // date error is. |
| - float InvalidDateSeverityScore(int cert_error) const; |
| + // |CERT_DATE_INVALID|. The calculated score is between 0.0 and 1.0, higher |
| + // being more severe, indicating how severe the certificate's |
| + // date invalid error is. |
| + void InvalidDateSeverityScore(); |
| // A function which calculates the severity score when the ssl error is |
| - // when the SSL error is |CERT_COMMON_NAME_INVALID|, returns a score between |
| - // between 0.0 and 1.0, higher values being more severe, indicating how |
| - // severe the certificate's common name invalid error is. |
| - float InvalidCommonNameSeverityScore(int cert_error) const; |
| + // |CERT_COMMON_NAME_INVALID|. The calculated score is between 0.0 and 1.0, |
| + // higher being more severe, indicating how severe the certificate's common |
| + // name invalid error is. |
| + void InvalidCommonNameSeverityScore(); |
| - void RecordUMAStatistics(bool overridable, int cert_error); |
| + void RecordUMAStatistics(bool overridable) const; |
| + void RecordCaptivePortalUMAStatistics(bool overridable) const; |
| base::TimeDelta TimePassedSinceExpiry() const; |
| private: |
| @@ -90,8 +103,6 @@ class SSLErrorClassification { |
| // fields. |
| bool IsCertLikelyFromMultiTenantHosting() const; |
| - float CalculateScoreTimePassedSinceExpiry() const; |
| - |
| static std::vector<Tokens> GetTokenizedDNSNames( |
| const std::vector<std::string>& dns_names); |
| @@ -109,13 +120,32 @@ class SSLErrorClassification { |
| static Tokens Tokenize(const std::string& name); |
| + float CalculateScoreTimePassedSinceExpiry() const; |
| + float CalculateScoreEnvironments() const; |
| + |
| + // content::NotificationObserver: |
| + virtual void Observe( |
| + int type, |
| + const content::NotificationSource& source, |
| + const content::NotificationDetails& details) OVERRIDE; |
| + |
| + content::WebContents* web_contents_; |
| // This stores the current time. |
| base::Time current_time_; |
| - |
| const GURL& request_url_; |
| - |
| + int cert_error_; |
| // This stores the certificate. |
| const net::X509Certificate& cert_; |
| + // Is captive portal detection enabled? |
| + bool captive_portal_detection_enabled_; |
| + // Did the probe complete before the interstitial was closed? |
| + bool captive_portal_probe_completed_; |
| + // Did the captive portal probe receive an error or get a non-HTTP response? |
| + bool captive_portal_no_response_; |
| + // Was a captive portal detected? |
| + bool captive_portal_detected_; |
| + |
| + content::NotificationRegistrar registrar_; |
| }; |
| #endif // CHROME_BROWSER_SSL_SSL_ERROR_CLASSIFICATION_H_ |